Skip to content

M1034 Limit Hardware Installation

Prevent unauthorized users or groups from installing or using hardware, such as external drives, peripheral devices, or unapproved internal hardware components, by enforcing hardware usage policies and technical controls. This includes disabling USB ports, restricting driver installation, and implementing endpoint security tools to monitor and block unapproved devices. This mitigation can be implemented through the following measures:

Disable USB Ports and Hardware Installation Policies:

  • Use Group Policy Objects (GPO) to disable USB mass storage devices:
    • Navigate to Computer Configuration > Administrative Templates > System > Removable Storage Access.
    • Deny write and read access to USB devices.
  • Whitelist approved devices using unique serial numbers via Windows Device Installation Policies.

Deploy Endpoint Protection and Device Control Solutions:

  • Use tools like Microsoft Defender for Endpoint, Symantec Endpoint Protection, or Tanium to monitor and block unauthorized hardware.
  • Implement device control policies to allow specific hardware types (e.g., keyboards, mice) and block others.

Harden BIOS/UEFI and System Firmware:

  • Set strong passwords for BIOS/UEFI access.
  • Enable Secure Boot to prevent rogue hardware components from loading unauthorized firmware.

Restrict Peripheral Devices and Drivers:

  • Use Windows Device Manager Policies to block installation of unapproved drivers.
  • Monitor hardware installation attempts through endpoint monitoring tools.

Disable Bluetooth and Wireless Hardware:

  • Use GPO or MDM tools to disable Bluetooth and Wi-Fi interfaces across systems.
  • Restrict hardware pairing to approved devices only.

Logging and Monitoring:

  • Enable logging for hardware installation events in Windows Event Logs (Event ID 20001 for Device Setup Manager).
  • Use SIEM solutions (e.g., Splunk, Elastic Stack) to detect unauthorized hardware installation activities.

Tools for Implementation

USB and Device Control:

  • Microsoft Group Policy Objects (GPO)
  • Microsoft Defender for Endpoint
  • Symantec Endpoint Protection
  • McAfee Device Control

Endpoint Monitoring:

  • EDRs
  • OSSEC (open-source host-based IDS)

Hardware Whitelisting:

  • BitLocker for external drives (Windows)
  • Windows Device Installation Policies
  • Device Control

BIOS/UEFI Security:

  • Secure Boot (Windows/Linux) Firmware management tools like Dell Command Update or HP Sure Start
Item Value
ID M1034
Version 1.1
Created 11 June 2019
Last Modified 18 December 2024
Navigation Layer View In ATT&CK® Navigator

Techniques Addressed by Mitigation

Domain ID Name Use
enterprise T1052 Exfiltration Over Physical Medium Limit the use of USB devices and removable media within a network.
enterprise T1052.001 Exfiltration over USB Limit the use of USB devices and removable media within a network.
enterprise T1200 Hardware Additions Block unknown devices and accessories by endpoint security configuration and monitoring agent.
enterprise T1674 Input Injection Limit the use of USB devices and removable media within a network.
enterprise T1219 Remote Access Tools Block the use of IP-based KVM devices within the network if they are not required.
enterprise T1219.003 Remote Access Hardware Block the use of IP-based KVM devices within the network if they are not required.
enterprise T1091 Replication Through Removable Media Limit the use of USB devices and removable media within a network.